Bug 1662437
| Summary: | SELinux is preventing find from 'read' accesses on the Verzeichnis vm. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Thomas Neuber <th.neuber> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 29 | CC: | dwalsh, jameschums, lvrabec, mgrepl, plautrba, zpytela |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:b7ed2f3ffe176aa2f647ddfd7b308d6fcd859eb2b8c9fd6b6191533e2aeea8f0;VARIANT_ID=workstation; | ||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-01-09 10:15:30 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
*** This bug has been marked as a duplicate of bug 1662441 *** |
Description of problem: cockpit and cockpit-pcp is installed and active on this system. The SELinux alerts appear during or after system (re)start. SELinux is preventing find from 'read' accesses on the Verzeichnis vm. ***** Plugin catchall (100. confidence) suggests ************************** Wenn Sie denken, dass es find standardmäßig erlaubt sein sollte, read Zugriff auf vm directory zu erhalten. Then sie sollten dies als Fehler melden. Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen. Do zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen: # ausearch -c 'find' --raw | audit2allow -M my-find # semodule -X 300 -i my-find.pp Additional Information: Source Context system_u:system_r:pcp_pmlogger_t:s0 Target Context system_u:object_r:sysctl_vm_t:s0 Target Objects vm [ dir ] Source find Source Path find Port <Unbekannt> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.2-44.fc29.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.19.10-300.fc29.x86_64 #1 SMP Mon Dec 17 15:34:44 UTC 2018 x86_64 x86_64 Alert Count 1 First Seen 2018-12-28 15:00:40 CET Last Seen 2018-12-28 15:00:40 CET Local ID 53ed0d51-5e34-475d-ac90-4528cf3b61bc Raw Audit Messages type=AVC msg=audit(1546005640.129:281): avc: denied { read } for pid=7796 comm="find" name="vm" dev="proc" ino=51330 scontext=system_u:system_r:pcp_pmlogger_t:s0 tcontext=system_u:object_r:sysctl_vm_t:s0 tclass=dir permissive=0 Hash: find,pcp_pmlogger_t,sysctl_vm_t,dir,read Version-Release number of selected component: selinux-policy-3.14.2-44.fc29.noarch Additional info: component: selinux-policy reporter: libreport-2.9.7 hashmarkername: setroubleshoot kernel: 4.19.10-300.fc29.x86_64 type: libreport